information security management system.€¦ · information security management system. information...

7
Innovations for a better world. Information Security Management System. Information Security at Bühler. V1.0, March 2020

Upload: others

Post on 25-Jul-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

Innovations for a better world.

Information Security Management System.

Information Security at Bühler.

V1.0, March 2020

Page 2: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

2

Information Cyber Security at Bühler.

Information Security at Bühler

Scope and purpose of this document

Information, data and its supporting processes, information systems and networks are vital to the business of Bühler and our customers and other business partners. The preservation of confidentiality, integrity and availability of valuable informati-on is even more important the more business processes are digitalized. This document describes the approach of Bühler to safeguard information and data Bühler is processing about or on behalf of our customers.

Information Security Management System

Bühler operates an Information Security Management System (ISMS) which is certified according to ISO/IEC 27001:2013 (he-rein referred to as “ISO standard”). The certification scope co-vers the design, development and operations processes of the internal IT services, myBühler, Bühler Insights and Mercury. In the next chapters, you will find a description of the information security management processes structured along the chapters of the ISO standard and how Bühler has implemented these requirements.

Context of the OrganizationBühler identified and manages the interested parties and inter-nal and external issues that have interest or relevance to Büh-ler’s information security. This includes for example customers, employees the current activities in the digital business, political, regulatory and economic changes, etc.

LeadershipInformation security is a top priority for Bühler. Senior manage-ment is closely involved in the operations of the ISMS. Regular reporting of the ISMS ensures that management is aware of new risks or potential issues within the management system.

PolicyThe CEO regularly releases a set of information security poli-cies, which are valid and mandatory for every employee in the Bühler Group. The policies include all relevant topics such as acceptable use of IT assets, handling of (customer) information/data, technical requirements for IT systems, etc.

Organizational roles, responsibilities and authorities The ISMS is governed and managed by the ISMS Steering Committee which contains members from all relevant depart-ments such as senior management, digital business, informati-on technology, legal, compliance, human resources and busi-ness representatives.

The roles and responsibilities regarding information security for every employee up to the Board of Directors are defined in our policies.

PlanningAn information security risk management process ensures that threats and vulnerabilities are identified, tracked and their miti-gation follows a clearly defined process. Bühler aims to reduce risks whenever reasonable and other risk treatment options such as acceptance or risk sharing with third parties (e.g. via insurance) are only applied when risk levels are within tolerable limits.

Objectives regarding information security are defined, measu-red, evaluated and reported at regular intervals to ensure the ISMS is always achieving its intended outcomes and expecta-tions.

SupportBühler has a dedicated information security team lead by the Head of Information Security which has global authority for the whole Bühler Group regarding information security.

Every employee (internal and external) which is using Bühler IT resources or has access to sensitive information is required to perform computer-based information security training as part of the onboarding process. Additional computer-based or class-room trainings take place when an additional need is identified.

The information security team is maintaining an Intranet site where news or educational content about information security is distributed to all employees.

OperationAs the core of the ISMS, information security-relevant risks are identified and reviewed, and the relevant risk treatment activi-ties are planned and tracked until they are completed, and the risk level has reached an acceptable value.

Page 3: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

3

Information Cyber Security at Bühler.

Performance evaluationISMS performance and effectiveness evaluation is following de-fined metrics and intervals and is reported to senior manage-ment. Potential adjustments of the ISMS are defined within the ISMS Steering Committee and carried out by the responsible teams.

Bühler has a defined process to perform internal ISMS audits, which are following a defined and approved audit program to ensure that all relevant in-scope areas are audited as required by the ISO 27001 standard.

The ISMS Steering Committee performs regular management reviews of the ISMS where the effectiveness of the ISMS, chan-ges in internal/external issues, the status of nonconformities and risk management activities, etc. are analyzed and potential necessary activities are defined and initiated.

ImprovementThe ISMS is continuously adapted to ensure continuous improvement of the ISMS and information security maturity in general.

Technical and organizational measures

Besides the main clauses in the ISO standard, where the gene-ral and formal requirements of an ISMS are defined, the “Annex A” defines 114 controls in 14 controls chapters which cover the relevant topics of information security. Such controls are coun-termeasures or safeguards and can be for example tools, pro-cesses or policies. Below you can find information about how Bühler addresses these controls.

A.5 Information security policiesBühler has a defined set of information security policies and requirements, which are regularly reviewed and adjusted as re-quired.

A.6 Organization of information securityA dedicated team with defined responsibilities and duties is handling information security. The team has regular exchanges with peers in other companies or authorities to stay up to date about current threats.

A.7 Human resource securityHuman resources processes for on- and offboarding are de-fined including necessary screening activities and contractual requirements which define the responsibilities regarding infor-mation security and protecting valuable information which in-cludes data of or about our customers.

A.8 Asset managementInformation assets are defined and used for the information se-curity risk management process. IT assets are managed in a global asset management database and follow defined proces-ses for creation and disposal including secure erasure of data. Handling requirements for different information classification levels are defined.

A.9 Access controlAccess to sensitive information such as data of or from our customers, follow defined access management requirements. For example, processes for granting and approving access permissions.

Global password requirements are defined and strong authen-tication methods (for example multi-factor authentication) are used to access critical services, i.e. if they are reachable from public networks or process sensitive information.

A.10 CryptographyEncryption technology is used to protect sensitive information for example by encrypting the local disks of client and desktop computers and by using a global company network with en-crypted VPN connections between all locations. For web appli-cations reachable over public networks “https” or equivalent secure protocols are required by our policies.

A.11 Physical and environmental securityPhysical perimeter protection ensures that only authorized indi-viduals can enter Bühler premises or sensitive areas such as data centers.

The main datacenters of Bühler which host the central and bu-siness-critical IT services are managed by professional data-center providers with adequate information security certifica-tions such as ISO/IEC 27001:2013 and SOC II.

On-premise datacenters follow defined policies and are

Page 4: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

4

Information Cyber Security at Bühler.

secured by physical access controls and specific equipment such as cooling systems, fire extinguishers, UPS, etc.

A.12 Operations securityA defined change management process ensures that all modi-fications to critical assets are properly documented and appro-ved.

All computers and servers are protected by an antivirus solution which is operated by a dedicated team.

Information security relevant logs are centrally collected, and potential security incidents are analyzed and acted on by the information security team.

A.13 Communications securityThe Bühler corporate network is centrally operated and has harmonized equipment in place. Network security related con-trols such as URL and malware filtering add an additional level of defense to prevent threats to the IT infrastructure.

Access to the Bühler corporate network is controlled and as-sets are located in segregated network zones.

A.14 System acquisition, development and maintenanceA secure development process is maintained and adapted by the different development teams. This process also includes defined activities and output requirements for the different pha-ses of the software development processes. Source code is regularly checked for vulnerabilities with automated tools and manual code reviews/approvals ensure that four-eyes principle is followed for code changes.

External and internal penetration tests are carried out to identify potential security issues in software.

A.15 Supplier relationshipsA global procurement organization ensures harmonized purchasing of services and suppliers of goods. Information se-curity relevant suppliers (for example cloud service providers or external consultants) are evaluated including information secu-rity and need to sign a document called “Minimum technical and organizational information security requirements for sup-pliers” which binds suppliers to apply similar levels of informati-on security controls as Bühler does.

A.16 Information security incident managementAll employees are asked to immediately report (potential) infor-mation security incidents so the necessary preventive or cor-rective measures can be taken. A systematic approach is used to ensure that lessons learned are carried out and similar issues are not happening again.

A.17 Information security aspects of business continuity managementBusiness critical IT services are designed with availability archi-tecture in mind. If disasters occur, IT follows defined processes for “IT Service Continuity”. Regular tests are carried out to en-sure these processes are working as designed.

A.18 ComplianceRelevant laws and regulations with potential impact to the ISMS and information security in general, are identified and monitored to be able to react on changes.

Bühler has a worldwide data protection organization and ap-plies GDPR principles globally or, if more strict, local regulatory requirements regarding data privacy.

Bühler regularly reviews its information security by reviews per-formed internally or together with external partners by conduc-ting penetration tests or similar security testing.

Compliance with information security policies is regularly revie-wed and monitored and violations follow defined sanctioning processes.

Bühler Digital Solutions

In addition to the general information security controls menti-oned in the chapters above the following specific controls are applied in our Digital Solutions to ensure customer data is pro-tected.

The software development and operations activities follow the defined policies and processes and are certified according to ISO 27001.

Bühler InsightsBühler Insights is the strategic platform for Bühler's digital solu-tions provided to customers. Bühler Insights collects telemetry data from machines at customer sites with an edge gateway

Page 5: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

5

Information Cyber Security at Bühler.

and transmits the data to the Bühler Insights platform. On the platform, the data is stored and processed, and customers can access various visualizations of the data in respective dash-boards.

Transparency and controlAll activities on Bühler Insights are logged to ensure the tracea-bility of any action taken. Any activity can only be performed by authorized operators who must securely authenticate to the services. None of the data is forwarded to third parties without anonymization or consent of the customer.

Encrypted communicationsThe main communication between customer installation and Bühler Insights is performed directly or by gateways as interme-diary systems. Algorithms used for encryption may vary over time and implemented devices/equipment. Adequate encrypti-on is applied when data is transmitted over public networks (i.e. AES-128, RSA 2048bit keys, SHA256 hashing, TLS 1.2 or bet-ter). Where applicable data is also encrypted at rest with secu-rely stored keys.

Microsoft AzureThe infrastructure of Bühler Insights is based on Microsoft Azu-re services. Azure holds multiple state of the art information se-curity certifications such as ISO 27001, 27017 and 27018 and SOC for the processes and activities Microsoft is responsible for. The full list can be found here.

For the activities Bühler is responsible for, the ISMS and infor-mation security controls are certified according to ISO 27001 apply.

Automation Solutions

Mercury MESMercury MES forms the automation basis for customers who are on one side operating with complex processes and on the other side need a high automation degree. Mercury enables a seamless exchange of information throughout all production process systems. Supported by Bühler, customers can optimi-ze workflows through communication between enterprise re-source planning (ERP), quality control, maintenance, and other systems. Data availability and real-time feedback enable smart

decision making enhancing plant performance and productivity. The software development process and other applicable activi-ties for this new web-based automation platform follow the glo-bally defined policies and are certified according to ISO 27001.

myBühlerThe myBühler customer portal is the digital contact gate for our customers and therefore your entry point to the digital solution portfolio of Bühler. Available in more than 120 countries world-wide and 8 languages, more than 6,000 customers enjoy ac-cess to information about installed machines, parts, orders and important documentation like spare parts catalogs and user manuals. myBühler enables easy ordering of spare & wear parts and can be integrated into existing purchasing systems for smooth purchasing processes. The software development and operations activities follow the defined policies and proces-ses and are certified according to ISO 27001.

IT ServicesThe internal IT services are operating all IT infrastructure and applications for Bühler globally. To ensure all valuable informati-on is protected at any time the ISMS includes the controls ap-plicable to the internal IT activities provided by the five IT Ser-vice Centers and are certified according to ISO 27001.

Shared Responsibility

To protect plants, systems, machines and networks against cy-ber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art security concept. Bühler products and solutions only form one element of such a con-cept.

The customer is responsible to prevent unauthorized access to its plants, systems, machines and networks. Systems, machi-nes and components should only be connected to the enterpri-se network or the internet if and to the extent necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place.

Bühler products and solutions undergo continuous develop-ment to make them more secure. Bühler strongly recommends applying product updates as soon as they’re available and to always use the latest product versions. This does not apply to

Page 6: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

6

Information Cyber Security at Bühler.

Digital Services and/or the underlying systems and compo-nents, including Embedded Software, which are updated by Bühler.

The use of product versions that are no longer supported and failure to apply the latest updates may increase customer’s ex-posure to cyber threats.

Further Information

In case you want to have more detailed information about infor-mation security please get in contact with your sales represen-tative or via the contact form. Bühler may not share sensitive details about information security but possibly specific topics can be discussed with the relevant team(s).

Disclaimer

This document is not part of and/or subject to the agreement regulating the use of the services or any purchase. The informa-tion in this document is not a commitment, promise, or legal obligation to deliver any material or service or to develop and provide any specific security feature or functionality. All for-ward-looking statements are subject to various risks and uncer-tainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue relian-ce on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. Bühler assumes no re-sponsibility for errors or omissions in this document, except if such damages were caused by Bühler intentionally or grossly negligent.

Page 7: Information Security Management System.€¦ · Information Security Management System. Information Security at Bühler. V1.0, March 2020. 2 Information Cyber Security at Bühler

Bühler AG

Gupfenstrasse 5 CH-9240 Uzwil Switzerland

www.buhlergroup.com

Version: 1.0, March 2020